treewrite: use Lindent to reformat to kernel coding style
[oweals/opkg-lede.git] / libopkg / opkg_pathfinder.c
index bf7dab68a55dff1061fd72df4f2c9416dabf09b5..98a6dd4ba2a4bd085d9102d600716ff0257b7cf4 100644 (file)
  *      validation on a certificate using pathfinder.
  *
  */
-static int pathfinder_verify_callback(X509_STORE_CTX *ctx, void *arg)
+static int pathfinder_verify_callback(X509_STORE_CTX * ctx, void *arg)
 {
-    char *errmsg;
-    const char *hex = "0123456789ABCDEF";
-    size_t size = i2d_X509(ctx->cert, NULL);
-    unsigned char *keybuf, *iend;
-    iend = keybuf = xmalloc(size);
-    i2d_X509(ctx->cert, &iend);
-    char *certdata_str = xmalloc(size * 2 + 1);
-    unsigned char *cp = keybuf;
-    char *certdata_str_i = certdata_str;
-    while (cp < iend)
-    {
-        unsigned char ch = *cp++;
-        *certdata_str_i++ = hex[(ch >> 4) & 0xf];
-        *certdata_str_i++ = hex[ch & 0xf];
-    }
-    *certdata_str_i = 0;
-    free(keybuf);
-
-    const char *policy = "2.5.29.32.0"; // anyPolicy
-    int validated = pathfinder_dbus_verify(certdata_str, policy, 0, 0, &errmsg);
-
-    if (!validated)
-        opkg_msg(ERROR, "Path verification failed: %s.\n", errmsg);
-
-    free(certdata_str);
-    free(errmsg);
-
-    return validated;
+       char *errmsg;
+       const char *hex = "0123456789ABCDEF";
+       size_t size = i2d_X509(ctx->cert, NULL);
+       unsigned char *keybuf, *iend;
+       iend = keybuf = xmalloc(size);
+       i2d_X509(ctx->cert, &iend);
+       char *certdata_str = xmalloc(size * 2 + 1);
+       unsigned char *cp = keybuf;
+       char *certdata_str_i = certdata_str;
+       while (cp < iend) {
+               unsigned char ch = *cp++;
+               *certdata_str_i++ = hex[(ch >> 4) & 0xf];
+               *certdata_str_i++ = hex[ch & 0xf];
+       }
+       *certdata_str_i = 0;
+       free(keybuf);
+
+       const char *policy = "2.5.29.32.0";     // anyPolicy
+       int validated =
+           pathfinder_dbus_verify(certdata_str, policy, 0, 0, &errmsg);
+
+       if (!validated)
+               opkg_msg(ERROR, "Path verification failed: %s.\n", errmsg);
+
+       free(certdata_str);
+       free(errmsg);
+
+       return validated;
 }
 #endif
 
 #if defined(HAVE_OPENSSL)
-int pkcs7_pathfinder_verify_signers(PKCS7* p7)
+int pkcs7_pathfinder_verify_signers(PKCS7 * p7)
 {
-    STACK_OF(X509) *signers;
-    int i, ret = 1; /* signers are verified by default */
+       STACK_OF(X509) * signers;
+       int i, ret = 1;         /* signers are verified by default */
 
-    signers = PKCS7_get0_signers(p7, NULL, 0);
+       signers = PKCS7_get0_signers(p7, NULL, 0);
 
-    for(i = 0; i < sk_X509_num(signers); i++){
-       X509_STORE_CTX ctx = {
-           .cert = sk_X509_value(signers, i),
-       };
+       for (i = 0; i < sk_X509_num(signers); i++) {
+               X509_STORE_CTX ctx = {
+                       .cert = sk_X509_value(signers, i),
+               };
 
-       if(!pathfinder_verify_callback(&ctx, NULL)){
-           /* Signer isn't verified ! goto jail; */
-           ret = 0;
-           break;
+               if (!pathfinder_verify_callback(&ctx, NULL)) {
+                       /* Signer isn't verified ! goto jail; */
+                       ret = 0;
+                       break;
+               }
        }
-    }
 
-    sk_X509_free(signers);
-    return ret;
+       sk_X509_free(signers);
+       return ret;
 }
 #endif
 
 #if defined(HAVE_SSLCURL)
-CURLcode curl_ssl_ctx_function(CURL * curl, void * sslctx, void * parm) {
+CURLcode curl_ssl_ctx_function(CURL * curl, void *sslctx, void *parm)
+{
 
-  SSL_CTX * ctx = (SSL_CTX *) sslctx;
-  SSL_CTX_set_cert_verify_callback(ctx, pathfinder_verify_callback, parm);
+       SSL_CTX *ctx = (SSL_CTX *) sslctx;
+       SSL_CTX_set_cert_verify_callback(ctx, pathfinder_verify_callback, parm);
 
-  return CURLE_OK ;
+       return CURLE_OK;
 }
 #endif